Author of the publication

Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion.

, , , , , and . ICSE-Companion, page 360-361. ACM/IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A First Look at Toxicity Injection Attacks on Open-domain Chatbots., , , , , and . ACSAC, page 521-534. ACM, (2023)NoiseScope: Detecting Deepfake Images in a Blind Setting., , , , and . ACSAC, page 913-927. ACM, (2020)I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions., , , , , and . EuroS&P, page 47-61. IEEE, (2018)An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape., , , , , , and . SP, page 91-109. IEEE, (2024)You are who you know: inferring user profiles in online social networks, , , and . Proceedings of the third ACM international conference on Web search and data mining, page 251--260. New York, NY, USA, ACM, (2010)What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites., , , , , and . AsiaCCS, page 181-192. ACM, (2019)Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion., , , , , and . ICSE-Companion, page 360-361. ACM/IEEE, (2022)Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation., , , , , , and . SP, page 1190-1206. IEEE, (2020)Deepfake Text Detection: Limitations and Opportunities., , , , , , , and . SP, page 1613-1630. IEEE, (2023)Complexity vs. performance: empirical analysis of machine learning as a service., , , , , and . Internet Measurement Conference, page 384-397. ACM, (2017)